Camouflaging EMI fingerprints in enterprise computer systems to enhance system security

    公开(公告)号:US11012862B2

    公开(公告)日:2021-05-18

    申请号:US16258544

    申请日:2019-01-26

    Abstract: The disclosed embodiments relate to a system that camouflages electromagnetic interference (EMI) fingerprints in EMI emissions from a computing system to enhance system security. During operation, the system monitors the EMI emissions from the computer system while the computer system is operating to produce corresponding EMI signals. Next, the system performs a Fast Fourier Transform (FFT) operation on the EMI signals. The system then converts an output of the FFT operation into a frequency-domain representation of the EMI signals. Next, the system generates a camouflaging signal based on the frequency-domain representation of the EMI signals. Finally, the system outputs the camouflaging signal through a transmitter to camouflage EMI fingerprints in the EMI emissions from the computer system.

    Ultra-wide band device fingerprinting

    公开(公告)号:US12156027B2

    公开(公告)日:2024-11-26

    申请号:US17749783

    申请日:2022-05-20

    Abstract: Device fingerprinting is provided for ultra-wide band (UWB) communications. A wireless receiver receives wireless signals including an UWB packet sent from a transmitter. Channel impulse response (CIR) data is extracted from the UWB packet. A device fingerprint of the transmitter is created according to the CIR data, the device fingerprint being representative of physical properties of the wireless signals of the UWB packet. The transmitter is authenticated by the receiver based on the device fingerprint.

    Smart Security Camera with Detection of Suspicious Cellphones

    公开(公告)号:US20240348761A1

    公开(公告)日:2024-10-17

    申请号:US18748055

    申请日:2024-06-19

    Abstract: A home security camera system captures a picture of a visitor and detects information about the visitor's smartphone, thereby providing a two-part digital ID of the visitor. The two-part ID is particularly useful to law enforcement when the picture portion of the ID happens to be blurry or obstructed. In some examples, a packet scanner sniffs probe requests transmitted by the visitor's phone. The packet scanner can be an integral part of the camera or sold separately. To comply with privacy regulations and bypass obfuscation efforts, the system analyzes various characteristics (e.g., data content and arrangement) of the phone's probe requests, rather than having to discover the true MAC address. The system can notify a resident when a particular friend, mail carrier, or porch pirate returns. The system can share collected digital IDs with other community members to provide neighbors with advanced warnings when certain visitors are in the area.

    ANCHORED WI-FI FINGERPRINTING FOR RISK-BASED AUTHENTICATION

    公开(公告)号:US20240314554A1

    公开(公告)日:2024-09-19

    申请号:US18122942

    申请日:2023-03-17

    CPC classification number: H04W12/06 H04W12/79 H04W84/12

    Abstract: This disclosure describes techniques for using an anchored endpoint to enhance MFA authentication of a client device. A method performed at least in part by a security service includes authenticating of a client device connecting to a secure resource. The method also includes determining a first Wi-Fi fingerprint of the client device, determining that the client device is within a threshold proximity to an anchor device, and determining a second Wi-Fi fingerprint of the anchor device. The method also includes detecting a change to the first Wi-Fi fingerprint of the client device and determining that the second Wi-Fi fingerprint of the anchor device has not changed. The method also includes determining whether the client device is within the threshold proximity of the anchor device, if it is, access to the secured resource continues to be allowed, if it is not, a reauthentication of the client device is triggered.

    Man in the Middle Attack Detection in BLE High Accuracy Distance Measurement

    公开(公告)号:US20240056818A1

    公开(公告)日:2024-02-15

    申请号:US17887847

    申请日:2022-08-15

    Inventor: Guner Arslan

    CPC classification number: H04W12/122 H04W12/79 H04B1/001

    Abstract: A system that is capable of detecting a Man in the Middle attack is disclosed. The system includes a receive circuit for receiving incoming packets. The system also includes a digitized model of at least part of the receive circuit and optionally part of the transmit circuit. The system compares the output from the digitized model with the output from the read circuit to determine the likelihood of a Man in the Middle Attack. In certain embodiments, the digitized model is a finite impulse response filter with multiple taps. The system correctly identifies Man in the Middle attacks more than 90% of the time when the signal to noise ratio is greater than 20 dB.

    ADAPTIVE AND HIERARCHICAL NETWORK AUTHENTICATION FRAMEWORK

    公开(公告)号:US20230188982A1

    公开(公告)日:2023-06-15

    申请号:US17550841

    申请日:2021-12-14

    CPC classification number: H04W12/06 H04W12/79

    Abstract: A non-transitory computer-readable storage medium stores instructions to configure a base station for user equipment (UE) authentication in a wireless network and to cause the base station to perform an operation comprising decoding configuration signaling received from a PHY security function (PSF) of the wireless network. The configuration signaling includes a request for collection of a plurality of signal samples from the UE, the UE authenticated based on successful completion of a first authentication process. A response message is encoded for transmission to the PSF. The response message includes the plurality of UE signal samples. A trained machine learning model received from the PSF is decoded. The trained machine learning model associates the authenticated UE with an RF signature of the UE. The RF signature is based on the plurality of signal samples. A second authentication process of the UE is performed based on the trained model.

Patent Agency Ranking